Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
From MaRDI portal
Publication:3631374
DOI10.1007/978-3-642-02002-5_7zbMATH Open1242.94036OpenAlexW1544728448MaRDI QIDQ3631374FDOQ3631374
Authors: Yuki Hara, Taiki Ishiwata, Junji Shikata, Tsutomu Matsumoto
Publication date: 9 June 2009
Published in: Formal to Practical Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02002-5_7
Recommendations
Cites Work
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Security arguments for digital signatures and blind signatures
- Communication Theory of Secrecy Systems*
- Further results on asymmetric authentication schemes
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- Group Signatures
- Title not available (Why is that?)
- Security in Communication Networks
- Theory of Cryptography
- A Cartesian product construction for unconditionally secure authentication codes that permit arbitration
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Unconditionally secure blind signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- A2-code = Affine resolvable + BIBD
- Constructions and bounds for unconditionally secure non-interactive commitment schemes
- Commitment and authentication systems
- Unconditionally Secure Anonymous Encryption and Group Authentication
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (1)
This page was built for publication: Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3631374)